CVE-2018-1071
Summary
| CVE | CVE-2018-1071 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-09 15:29:00 UTC |
| Updated | 2023-02-12 23:32:00 UTC |
| Description | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1553531 – (CVE-2018-1071) CVE-2018-1071 zsh: Stack-based buffer overflow in exec.c:hashcmd() |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| [SECURITY] [DLA 2470-1] zsh security update |
MLIST |
lists.debian.org |
|
| Zsh: Multiple vulnerabilities (GLSA 201805-10) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| CVE-2018-1071 - Red Hat Customer Portal |
MISC |
access.redhat.com |
|
| Zsh 'exec.c:hashcmd()' Function Local Denial of Service Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [SECURITY] [DLA 1335-1] zsh security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| USN-3608-1: Zsh vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500832 Alpine Linux Security Update for zsh
- 504569 Alpine Linux Security Update for zsh
- 710220 Gentoo Linux Zsh Multiple Vulnerabilities (GLSA 201805-10)
- 753235 SUSE Enterprise Linux Security Update for zsh (SUSE-SU-2022:14910-1)